633 results on '"Huberman, Bernardo"'
Search Results
2. Experimental Demonstration of Secure Frequency Hopping Communication Enabled by Quantum Key Distribution
- Author
-
Huberman, Bernardo A., Lund, Bob, Wang, Jing, and Cheng, Lin
- Subjects
Quantum Physics ,Computer Science - Cryptography and Security - Abstract
We propose and experimentally demonstrate a method of frequency hopping spread spectrum communication using a quantum key distribution network to deliver the frequency hopping pattern for secure wireless communications. Results show low interception and jamming probabilities.
- Published
- 2023
3. Time-Interleaved C-band Co-Propagation of Quantum and Classical Channels
- Author
-
Wang, Jing, Rollick, Brian J., and Huberman, Bernardo A.
- Subjects
Quantum Physics ,Computer Science - Cryptography and Security ,Computer Science - Networking and Internet Architecture - Abstract
A successful commercial deployment of quantum key distribution (QKD) technologies requires integrating QKD links into existing fibers and sharing the same fiber networks with classical data traffic. To mitigate the spontaneous Raman scattering (SpRS) noise from classical data channels, several quantum/classical coexistence strategies have been developed. O-band solutions place the QKD channel in the O-band for lower SpRS noise but with the penalty of higher fiber loss and can rarely reach beyond 80 km of fiber; another method is C-band coexistence with attenuated classical channels, which sacrifices the performance of classical channels for lower SpRS noise. In this work, a time-interleaving technique is demonstrated to enable the co-propagation of quantum and classical channels in the C-band without sacrificing either performance. By embedding QKD pulses in the gaps between classical data frames, the quantum channel is isolated from SpRS noise in both wavelength and time domains. C-band co-propagation of a polarization-encoding decoy-state BB84 QKD channel with a 100 Gb/s QPSK channel is experimentally demonstrated with quantum bit error rate (QBER) of 1.12%, 2.04%, and 3.81% and secure key rates (SKR) of 39.5 kb/s, 6.35 kb/s, and 128 b/s over 20, 50, and 100 km fibers, respectively. These results were achieved with the presence of classical launch power up to 10 dBm, which is at least one order of magnitude higher than reported works. We also demonstrated the co-propagation of a QKD channel with eight classical channels with total launch power up to 18-dBm (9-dBm per channel), which is the highest power of classical channels reported in C-band coexistence works.
- Published
- 2023
4. Why Neural Networks Work
- Author
-
Mukherjee, Sayandev, Huberman, Bernardo A., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Arai, Kohei, editor
- Published
- 2024
- Full Text
- View/download PDF
5. Why Neural Networks Work
- Author
-
Mukherjee, Sayandev and Huberman, Bernardo A.
- Subjects
Computer Science - Machine Learning ,Computer Science - Computers and Society ,Computer Science - Neural and Evolutionary Computing ,Statistics - Machine Learning - Abstract
We argue that many properties of fully-connected feedforward neural networks (FCNNs), also called multi-layer perceptrons (MLPs), are explainable from the analysis of a single pair of operations, namely a random projection into a higher-dimensional space than the input, followed by a sparsification operation. For convenience, we call this pair of successive operations expand-and-sparsify following the terminology of Dasgupta. We show how expand-and-sparsify can explain the observed phenomena that have been discussed in the literature, such as the so-called Lottery Ticket Hypothesis, the surprisingly good performance of randomly-initialized untrained neural networks, the efficacy of Dropout in training and most importantly, the mysterious generalization ability of overparameterized models, first highlighted by Zhang et al. and subsequently identified even in non-neural network models by Belkin et al., Comment: 13 pages
- Published
- 2022
6. Auction-based Operation in LEO Satellite Systems for High-Efficiency Communications
- Author
-
Cheng, Lin and Huberman, Bernardo A.
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
We propose an auction-based mechanism to improve the efficiency of low earth orbit satellite communication systems. The mechanism allows the ground stations to bid for downlink resources such as spectrum, satellite links, or radios, without the need to send channel status back to satellites. Simulation and experimental results show that this mechanism improves total channel capacity by dynamically leveraging the diversity among satellite-station links; reduces uplink overhead by providing lightweight and effective channel status feedback; simplifies computational complexity and improves scalability; and also provides implicit resource information stemming from the auction dynamics. This new operation mechanism provides a feasible solution for low earth orbit satellites which are sensitive to power consumption and overheating.
- Published
- 2022
7. Reinforcement Learning for Standards Design
- Author
-
Kasi, Shahrukh Khan, Mukherjee, Sayandev, Cheng, Lin, and Huberman, Bernardo A.
- Subjects
Statistics - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning ,Computer Science - Networking and Internet Architecture ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Communications standards are designed via committees of humans holding repeated meetings over months or even years until consensus is achieved. This includes decisions regarding the modulation and coding schemes to be supported over an air interface. We propose a way to "automate" the selection of the set of modulation and coding schemes to be supported over a given air interface and thereby streamline both the standards design process and the ease of extending the standard to support new modulation schemes applicable to new higher-level applications and services. Our scheme involves machine learning, whereby a constructor entity submits proposals to an evaluator entity, which returns a score for the proposal. The constructor employs reinforcement learning to iterate on its submitted proposals until a score is achieved that was previously agreed upon by both constructor and evaluator to be indicative of satisfying the required design criteria (including performance metrics for transmissions over the interface).
- Published
- 2021
8. SAFE: Secure Aggregation with Failover and Encryption
- Author
-
Sandholm, Thomas, Mukherjee, Sayandev, and Huberman, Bernardo A.
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Cryptography and Security - Abstract
We propose and experimentally evaluate a novel secure aggregation algorithm targeted at cross-organizational federated learning applications with a fixed set of participating learners. Our solution organizes learners in a chain and encrypts all traffic to reduce the controller of the aggregation to a mere message broker. We show that our algorithm scales better and is less resource demanding than existing solutions, while being easy to implement on constrained platforms. With 36 nodes our method outperforms state-of-the-art secure aggregation by 70x, and 56x with and without failover, respectively.
- Published
- 2021
9. A Reconfigurable Relay for Polarization Encoded QKD Networks
- Author
-
Wang, Jing and Huberman, Bernardo A.
- Subjects
Quantum Physics ,Computer Science - Networking and Internet Architecture ,Physics - Applied Physics - Abstract
We propose a method for reconfiguring a relay node for polarization encoded quantum key distribution (QKD) networks. The relay can be switched between trusted and untrusted modes to adapt to different network conditions, relay distances, and security requirements. This not only extends the distance over which a QKD network operates but also enables point-to-multipoint (P2MP) network topologies. The proposed architecture centralizes the expensive and delicate single-photon detectors (SPDs) at the relay node with eased maintenance and cooling while simplifying each user node so that it only needs commercially available devices for low-cost qubit preparation.
- Published
- 2021
10. A Guide to Global Quantum Key Distribution Networks
- Author
-
Wang, Jing and Huberman, Bernardo
- Subjects
Quantum Physics ,Computer Science - Cryptography and Security ,Computer Science - Computers and Society ,Computer Science - Networking and Internet Architecture - Abstract
We describe systems and methods for the deployment of global quantum key distribution (QKD) networks covering transoceanic, long-haul, metro, and access segments of the network. A comparative study of the state-of-the-art QKD technologies is carried out, including both terrestrial QKD via optical fibers and free-space optics, as well as spaceborne solutions via satellites. We compare the pros and cons of various existing QKD technologies, including channel loss, potential interference, distance, connection topology, deployment cost and requirements, as well as application scenarios. Technical selection criteria and deployment requirements are developed for various different QKD solutions in each segment of networks. For example, optical fiber-based QKD is suitable for access networks due to its limited distance and compatibility with point-to-multipoint (P2MP) topology; with the help of trusted relays, it can be extended to long-haul and metro networks. Spaceborne QKD on the other hand, has much smaller channel loss and extended transmission distance, which can be used for transoceanic and long-haul networks exploiting satellite-based trusted relays.
- Published
- 2020
11. Privacy and Data Balkanization: Circumventing the Barriers
- Author
-
Huberman, Bernardo A. and Hogg, Tad
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Computers and Society - Abstract
The rapid growth in digital data forms the basis for a wide range of new services and research, e.g, large-scale medical studies. At the same time, increasingly restrictive privacy concerns and laws are leading to significant overhead in arranging for sharing or combining different data sets to obtain these benefits. For new applications, where the benefit of combined data is not yet clear, this overhead can inhibit organizations from even trying to determine whether they can mutually benefit from sharing their data. In this paper, we discuss techniques to overcome this difficulty by employing private information transfer to determine whether there is a benefit from sharing data, and whether there is room to negotiate acceptable prices. These techniques involve cryptographic protocols. While currently considered secure, these protocols are potentially vulnerable to the development of quantum technology, particularly for ensuring privacy over significant periods of time into the future. To mitigate this concern, we describe how developments in practical quantum technology can improve the security of these protocols.
- Published
- 2020
- Full Text
- View/download PDF
12. Quantum Secured Internet Transport
- Author
-
Huberman, Bernardo, Lund, Bob, and Wang, Jing
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Computers and Society ,Computer Science - Networking and Internet Architecture ,Quantum Physics - Abstract
Quantum computing represents an emerging threat to the public key infrastructure underlying transport layer security (TLS) widely used in the Internet. This paper describes how QKD symmetric keys can be used with TLS to provide quantum computing resistant security for existing Internet applications. We also implement and test a general hybrid key delivery architecture with QKD over long distance fibers between secure sites, and wireless key distribution over short distance within each site Finally we show how this same capability can be extended to a TLS cipher scheme with perfect security., Comment: 9 pages, 8 figures
- Published
- 2020
13. Market-based Short-Term Allocations in Small Cell Wireless Networks
- Author
-
Mukherjee, Sayandev and Huberman, Bernardo A.
- Subjects
Computer Science - Information Theory - Abstract
Mobile users (or UEs, to use 3GPP terminology) served by small cells in dense urban settings may abruptly experience a significant deterioration in their channel to their serving base stations (BSs) in several scenarios, such as after turning a corner around a tall building, or a sudden knot of traffic blocking the direct path between the UE and its serving BS. In this work, we propose a scheme to temporarily increase the data rate to/from this UE with additional bandwidth from the nearest Coordinated Multi-Point (CoMP) cluster of BSs, while the slower process of handover of the UE to a new serving BS is ongoing. We emphasize that this additional bandwidth is additional to the data rates the UE is getting over its primary connection to the current serving BS and, after the handover, to the new serving BS. The key novelty of the present work is the proposal of a decentralized market-based resource allocation method to perform resource allocation to support Coordinated Beamforming (CB) CoMP. It is scalable to large numbers of UEs and BSs, and it is fast because resource allocations are made bilaterally, between BSs and UEs. Once the resource allocation to the UE has been made, the coordinated of transmissions occurs as per the usual CB methods. Thus the proposed method has the benefit of giving the UE access to its desired amount of resources fast, without waiting for handover to complete, or reporting channel state information before it knows the resources it will be allocated for receiving transmissions from the serving BS., Comment: 18 pages, 1 figure
- Published
- 2020
14. Intelligent Bandwidth Allocation for Latency Management in NG-EPON using Reinforcement Learning Methods
- Author
-
Zhou, Qi, Zhu, Jingjie, Zhang, Junwen, Jia, Zhensheng, Huberman, Bernardo, and Chang, Gee-Kung
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Signal Processing - Abstract
A novel intelligent bandwidth allocation scheme in NG-EPON using reinforcement learning is proposed and demonstrated for latency management. We verify the capability of the proposed scheme under both fixed and dynamic traffic loads scenarios to achieve <1ms average latency. The RL agent demonstrates an efficient intelligent mechanism to manage the latency, which provides a promising IBA solution for the next-generation access network.
- Published
- 2020
15. Learning to Wait: Wi-Fi Contention Control using Load-based Predictions
- Author
-
Sandholm, Thomas, Huberman, Bernardo, Hamzeh, Belal, and Clearwater, Scott
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
We propose and experimentally evaluate a novel method that dynamically changes the contention window of access points based on system load to improve performance in a dense Wi-Fi deployment. A key feature is that no MAC protocol changes, nor client side modifications are needed to deploy the solution. We show that setting an optimal contention window can lead to throughput and latency improvements up to 155%, and 50%, respectively. Furthermore, we devise an online learning method that efficiently finds the optimal contention window with minimal training data, and yields an average improvement in throughput of 53-55% during congested periods for a real traffic-volume workload replay in a Wi-Fi test-bed.
- Published
- 2019
16. Dynamic Bandwidth Allocation in Small-Cell Networks: An Economics Approach
- Author
-
Cheng, Lin and Huberman, Bernardo A.
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
We propose and experimentally demonstrate a bandwidth allocation method based on the comparative advantage of spectral efficiency among users in a multi-tone small-cell radio access system with frequency-selective fading channels. The method allocates frequency resources by ranking the comparative advantage of the spectrum measured at the receivers ends. It improves the overall spectral efficiency of the access system with low implementation complexity and independently of power loading. In a two-user wireless transmission experiment, we observe up to 23.1% average capacity improvement by using the proposed method.
- Published
- 2019
17. A Quantum Router for the Entangled Web
- Author
-
Huberman, Bernardo A. and Lund, Bob
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Emerging Technologies ,Quantum Physics - Abstract
Qubit transmission protocols are presently point-to-point, and thus restrictive in their functionality. A quantum router is necessary for the quantum Internet to become a reality. We present a quantum router design based on teleportation, as well as mechanisms for entangled pair management. The prototype was validated using a quantum simulator.
- Published
- 2019
18. Power Loading based on Portfolio Theory for Densified Millimeter-Wave Small-Cell Communications
- Author
-
Shen, Shuyi, Huberman, Bernardo A., Cheng, Lin, and Chang, Gee-Kung
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
We experimentally demonstrate a novel scheme of power loading based on portfolio theory for millimeter-wave small-cell densification. By exploiting the statistical characteristics of interference, this approach improves the average throughput by 91% and reduces the variance.
- Published
- 2019
19. A Learning Approach to Wi-Fi Access
- Author
-
Sandholm, Thomas and Huberman, Bernardo A.
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
We show experimentally that workload-based AP-STA associations can improve system throughput significantly. We present a predictive model that guides optimal resource allocations in dense Wi-Fi networks and achieves 72-77% of the optimal throughput with varying training data set sizes using a 3-day trace of real cable modem traffic.
- Published
- 2018
20. A Guide to the Deployment of Global Quantum Key Distribution Networks
- Author
-
Wang, Jing, Huberman, Bernardo A., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Arai, Kohei, editor
- Published
- 2022
- Full Text
- View/download PDF
21. Hallucinations and Emergence in Large Language Models
- Author
-
Huberman, Bernardo A., primary and Mukherjee, Sayandev, additional
- Published
- 2024
- Full Text
- View/download PDF
22. Time-Interleaved C-Band Co-Propagation of Quantum and Classical Channels
- Author
-
Wang, Jing, primary, Rollick, Brian J., additional, Jia, Zhensheng, additional, and Huberman, Bernardo A., additional
- Published
- 2024
- Full Text
- View/download PDF
23. Privacy and data balkanization: circumventing the barriers
- Author
-
Huberman, Bernardo A. and Hogg, Tad
- Published
- 2021
- Full Text
- View/download PDF
24. Stringer: Balancing Latency and Resource Usage in Service Function Chain Provisioning
- Author
-
Chua, Freddy C., Ward, Julie, Zhang, Ying, Sharma, Puneet, and Huberman, Bernardo A.
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
Network Functions Virtualization, or NFV, enables telecommunications infrastructure providers to replace special-purpose networking equipment with commodity servers running virtualized network functions (VNFs). A service provider utilizing NFV technology faces the SFC provisioning problem of assigning VNF instances to nodes in the physical infrastructure (e.g., a datacenter), and routing Service Function Chains (sequences of functions required by customers, a.k.a. SFCs) in the physical network. In doing so, the provider must balance between various competing goals of performance and resource usage. We present an approach for SFC provisioning, consisting of three elements. The first element is a fast, scalable round-robin heuristic. The second element is a Mixed Integer Programming (MIP) based approach. The third element is a queueing-theoretic model to estimate the average latency associated with any SFC provisioning solution. Combined, these elements create an approach that generates a set of SFC provisioning solutions, reflecting different tradeoffs between resource usage and performance.
- Published
- 2016
25. Comparative Advantage Driven Resource Allocation for Virtual Network Functions
- Author
-
Huberman, Bernardo A. and Sharma, Puneet
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Computers and Society - Abstract
As Communication Service Providers (CSPs) adopt the Network Function Virtualization (NFV) paradigm, they need to transition their network function capacity to a virtualized infrastructure with different Network Functions running on a set of heterogeneous servers. This abstract describes a novel technique for allocating server resources (compute, storage and network) for a given set of Virtual Network Function (VNF) requirements. Our approach helps the telco providers decide the most effective way to run several VNFs on servers with different performance characteristics. Our analysis of prior VNF performance characterization on heterogeneous/different server resource allocations shows that the ability to arbitrarily create many VNFs among different servers' resource allocations leads to a comparative advantage among servers. We propose a VNF resource allocation method called COMPARE that maximizes the total throughput of the system by formulating this resource allocation problem as a comparative advantage problem among heterogeneous servers. There several applications for using the VNF resource allocation from COMPARE including transitioning current Telco deployments to NFV based solutions and providing initial VNF placement for Service Function Chain (SFC) provisioning.
- Published
- 2016
26. A Bayesian Approach to the Partitioning of Workflows
- Author
-
Chua, Freddy C. and Huberman, Bernardo A.
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Physics - Physics and Society - Abstract
When partitioning workflows in realistic scenarios, the knowledge of the processing units is often vague or unknown. A naive approach to addressing this issue is to perform many controlled experiments for different workloads, each consisting of multiple number of trials in order to estimate the mean and variance of the specific workload. Since this controlled experimental approach can be quite costly in terms of time and resources, we propose a variant of the Gibbs Sampling algorithm that uses a sequence of Bayesian inference updates to estimate the processing characteristics of the processing units. Using the inferred characteristics of the processing units, we are able to determine the best way to split a workflow for processing it in parallel with the lowest expected completion time and least variance.
- Published
- 2015
27. Partitioning Uncertain Workflows
- Author
-
Huberman, Bernardo A. and Chua, Freddy C.
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Computers and Society ,Physics - Physics and Society - Abstract
It is common practice to partition complex workflows into separate channels in order to speed up their completion times. When this is done within a distributed environment, unavoidable fluctuations make individual realizations depart from the expected average gains. We present a method for breaking any complex workflow into several workloads in such a way that once their outputs are joined, their full completion takes less time and exhibit smaller variance than when running in only one channel. We demonstrate the effectiveness of this method in two different scenarios; the optimization of a convex function and the transmission of a large computer file over the Internet.
- Published
- 2015
28. QoS-Based Pricing and Scheduling of Batch Jobs in OpenStack Clouds
- Author
-
Sandholm, Thomas, Ward, Julie, Balestrieri, Filippo, and Huberman, Bernardo A.
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
The current Cloud infrastructure services (IaaS) market employs a resource-based selling model: customers rent nodes from the provider and pay per-node per-unit-time. This selling model places the burden upon customers to predict their job resource requirements and durations. Inaccurate prediction by customers can result in over-provisioning of resources, or under-provisioning and poor job performance. Thanks to improved resource virtualization and multi-tenant performance isolation, as well as common frameworks for batch jobs, such as MapReduce, Cloud providers can predict job completion times more accurately. We offer a new definition of QoS-levels in terms of job completion times and we present a new QoS-based selling mechanism for batch jobs in a multi-tenant OpenStack cluster. Our experiments show that the QoS-based solution yields up to 40% improvement over the revenue of more standard selling mechanisms based on a fixed per-node price across various demand and supply conditions in a 240-VCPU OpenStack cluster.
- Published
- 2015
29. Attention decay in science
- Author
-
Parolo, Pietro Della Briotta, Pan, Raj Kumar, Ghosh, Rumi, Huberman, Bernardo A., Kaski, Kimmo, and Fortunato, Santo
- Subjects
Physics - Physics and Society ,Computer Science - Computers and Society ,Computer Science - Digital Libraries ,Computer Science - Social and Information Networks ,Physics - Data Analysis, Statistics and Probability - Abstract
The exponential growth in the number of scientific papers makes it increasingly difficult for researchers to keep track of all the publications relevant to their work. Consequently, the attention that can be devoted to individual papers, measured by their citation counts, is bound to decay rapidly. In this work we make a thorough study of the life-cycle of papers in different disciplines. Typically, the citation rate of a paper increases up to a few years after its publication, reaches a peak and then decreases rapidly. This decay can be described by an exponential or a power law behavior, as in ultradiffusive processes, with exponential fitting better than power law for the majority of cases. The decay is also becoming faster over the years, signaling that nowadays papers are forgotten more quickly. However, when time is counted in terms of the number of published papers, the rate of decay of citations is fairly independent of the period considered. This indicates that the attention of scholars depends on the number of published items, and not on real time., Comment: Published version. 14 pages, 9 Figures
- Published
- 2015
- Full Text
- View/download PDF
30. Deciding what to display: maximizing the information value of social media
- Author
-
Servia-Rodríguez, Sandra, Huberman, Bernardo A., and Asur, Sitaram
- Subjects
Computer Science - Computers and Society ,Computer Science - Human-Computer Interaction ,Computer Science - Social and Information Networks ,Physics - Physics and Society - Abstract
In information-rich environments, the competition for users' attention leads to a flood of content from which people often find hard to sort out the most relevant and useful pieces. Using Twitter as a case study, we applied an attention economy solution to generate the most informative tweets for its users. By considering the novelty and popularity of tweets as objective measures of their relevance and utility, we used the Huberman-Wu algorithm to automatically select the ones that will receive the most attention in the next time interval. Their predicted popularity was confirmed by using Twitter data collected for a period of 2 months.
- Published
- 2014
31. Privacy and Data Balkanization: Circumventing the Barriers
- Author
-
Huberman, Bernardo A., primary and Hogg, Tad, additional
- Published
- 2023
- Full Text
- View/download PDF
32. Detecting Flow Anomalies in Distributed Systems
- Author
-
Chua, Freddy Chong Tat, Lim, Ee-Peng, and Huberman, Bernardo A.
- Subjects
Computer Science - Computers and Society ,Computer Science - Social and Information Networks ,Physics - Physics and Society - Abstract
Deep within the networks of distributed systems, one often finds anomalies that affect their efficiency and performance. These anomalies are difficult to detect because the distributed systems may not have sufficient sensors to monitor the flow of traffic within the interconnected nodes of the networks. Without early detection and making corrections, these anomalies may aggravate over time and could possibly cause disastrous outcomes in the system in the unforeseeable future. Using only coarse-grained information from the two end points of network flows, we propose a network transmission model and a localization algorithm, to detect the location of anomalies and rank them using a proposed metric within distributed systems. We evaluate our approach on passengers' records of an urbanized city's public transportation system and correlate our findings with passengers' postings on social media microblogs. Our experiments show that the metric derived using our localization algorithm gives a better ranking of anomalies as compared to standard deviation measures from statistical models. Our case studies also demonstrate that transportation events reported in social media microblogs matches the locations of our detect anomalies, suggesting that our algorithm performs well in locating the anomalies within distributed systems.
- Published
- 2014
33. Dynamics of Trends and Attention in Chinese Social Media
- Author
-
Yu, Louis Lei, Asur, Sitaram, and Huberman, Bernardo A.
- Subjects
Computer Science - Social and Information Networks ,Computer Science - Computers and Society ,Physics - Physics and Society - Abstract
There has been a tremendous rise in the growth of online social networks all over the world in recent years. It has facilitated users to generate a large amount of real-time content at an incessant rate, all competing with each other to attract enough attention and become popular trends. While Western online social networks such as Twitter have been well studied, the popular Chinese microblogging network Sina Weibo has had relatively lower exposure. In this paper, we analyze in detail the temporal aspect of trends and trend-setters in Sina Weibo, contrasting it with earlier observations in Twitter. We find that there is a vast difference in the content shared in China when compared to a global social network such as Twitter. In China, the trends are created almost entirely due to the retweets of media content such as jokes, images and videos, unlike Twitter where it has been shown that the trends tend to have more to do with current global events and news stories. We take a detailed look at the formation, persistence and decay of trends and examine the key topics that trend in Sina Weibo. One of our key findings is that retweets are much more common in Sina Weibo and contribute a lot to creating trends. When we look closer, we observe that most trends in Sina Weibo are due to the continuous retweets of a small percentage of fraudulent accounts. These fake accounts are set up to artificially inflate certain posts, causing them to shoot up into Sina Weibo's trending list, which are in turn displayed as the most popular topics to users., Comment: arXiv admin note: substantial text overlap with arXiv:1202.0327
- Published
- 2013
34. Semantic Stability in Social Tagging Streams
- Author
-
Wagner, Claudia, Singer, Philipp, Strohmaier, Markus, and Huberman, Bernardo A.
- Subjects
Computer Science - Computers and Society ,Computer Science - Information Retrieval ,Computer Science - Social and Information Networks ,Physics - Physics and Society - Abstract
One potential disadvantage of social tagging systems is that due to the lack of a centralized vocabulary, a crowd of users may never manage to reach a consensus on the description of resources (e.g., books, users or songs) on the Web. Yet, previous research has provided interesting evidence that the tag distributions of resources may become semantically stable over time as more and more users tag them. At the same time, previous work has raised an array of new questions such as: (i) How can we assess the semantic stability of social tagging systems in a robust and methodical way? (ii) Does semantic stabilization of tags vary across different social tagging systems and ultimately, (iii) what are the factors that can explain semantic stabilization in such systems? In this work we tackle these questions by (i) presenting a novel and robust method which overcomes a number of limitations in existing methods, (ii) empirically investigating semantic stabilization processes in a wide range of social tagging systems with distinct domains and properties and (iii) detecting potential causes for semantic stabilization, specifically imitation behavior, shared background knowledge and intrinsic properties of natural language. Our results show that tagging streams which are generated by a combination of imitation dynamics and shared background knowledge exhibit faster and higher semantic stability than tagging streams which are generated via imitation dynamics or natural language streams alone.
- Published
- 2013
35. Information Relaxation is Ultradiffusive
- Author
-
Ghosh, Rumi and Huberman, Bernardo A.
- Subjects
Computer Science - Social and Information Networks ,Computer Science - Computers and Society ,Physics - Physics and Society - Abstract
We investigate how the overall response to a piece of information (a story or an article) evolves and relaxes as a function of time in social networks like Reddit, Digg and Youtube. This response or popularity is measured in terms of the number of votes/comments that the story (or article) accrued over time. We find that the temporal evolution of popularity can be described by a universal function whose parameters depend upon the system under consideration. Unlike most previous studies, which empirically investigated the dynamics of voting behavior, we also give a theoretical interpretation of the observed behavior using ultradiffusion. Whether it is the inter-arrival time between two consecutive votes on a story on Reddit or the comments on a video shared on Youtube, there is always a hierarchy of time scales in information propagation. One vote/comment might occur almost simultaneously with the previous, whereas another vote/comment might occur hours after the preceding one. This hierarchy of time scales leads us to believe that the dynamical response of users to information is ultradiffusive in nature. We show that a ultradiffusion based stochastic process can be used to rationalize the observed temporal evolution.
- Published
- 2013
36. A Quantum Router For The Entangled Web
- Author
-
Huberman, Bernardo A. and Lund, Bob
- Published
- 2020
- Full Text
- View/download PDF
37. How Random are Online Social Interactions?
- Author
-
Wang, Chunyan and Huberman, Bernardo A.
- Subjects
Computer Science - Computers and Society ,Computer Science - Social and Information Networks ,Physics - Physics and Society - Abstract
The massive amounts of data that social media generates has facilitated the study of online human behavior on a scale unimaginable a few years ago. At the same time, the much discussed apparent randomness with which people interact online makes it appear as if these studies cannot reveal predictive social behaviors that could be used for developing better platforms and services. We use two large social databases to measure the mutual information entropy that both individual and group actions generate as they evolve over time. We show that user's interaction sequences have strong deterministic components, in contrast with existing assumptions and models. In addition, we show that individual interactions are more predictable when users act on their own rather than when attending group activities.
- Published
- 2012
38. A Market for Unbiased Private Data: Paying Individuals According to their Privacy Attitudes
- Author
-
Aperjis, Christina and Huberman, Bernardo A.
- Subjects
Computer Science - Computers and Society ,Computer Science - Social and Information Networks ,Physics - Physics and Society - Abstract
Since there is, in principle, no reason why third parties should not pay individuals for the use of their data, we introduce a realistic market that would allow these payments to be made while taking into account the privacy attitude of the participants. And since it is usually important to use unbiased samples to obtain credible statistical results, we examine the properties that such a market should have and suggest a mechanism that compensates those individuals that participate according to their risk attitudes. Equally important, we show that this mechanism also benefits buyers, as they pay less for the data than they would if they compensated all individuals with the same maximum fee that the most concerned ones expect.
- Published
- 2012
39. From User Comments to On-line Conversations
- Author
-
Wang, Chunyan, Ye, Mao, and Huberman, Bernardo A.
- Subjects
Computer Science - Computers and Society ,Computer Science - Social and Information Networks ,Physics - Physics and Society - Abstract
We present an analysis of user conversations in on-line social media and their evolution over time. We propose a dynamic model that accurately predicts the growth dynamics and structural properties of conversation threads. The model successfully reconciles the differing observations that have been reported in existing studies. By separating artificial factors from user behaviors, we show that there are actually underlying rules in common for on-line conversations in different social media websites. Results of our model are supported by empirical measurements throughout a number of different social media websites.
- Published
- 2012
40. Artificial Inflation: The True Story of Trends in Sina Weibo
- Author
-
Yu, Louis, Asur, Sitaram, and Huberman, Bernardo A.
- Subjects
Computer Science - Computers and Society ,Computer Science - Social and Information Networks ,Physics - Physics and Society - Abstract
There has been a tremendous rise in the growth of online social networks all over the world in recent years. This has facilitated users to generate a large amount of real-time content at an incessant rate, all competing with each other to attract enough attention and become trends. While Western online social networks such as Twitter have been well studied, characteristics of the popular Chinese microblogging network Sina Weibo have not been. In this paper, we analyze in detail the temporal aspect of trends and trend-setters in Sina Weibo, constrasting it with earlier observations on Twitter. First, we look at the formation, persistence and decay of trends and examine the key topics that trend in Sina Weibo. One of our key findings is that retweets are much more common in Sina Weibo and contribute a lot to creating trends. When we look closer, we observe that a large percentage of trends in Sina Weibo are due to the continuous retweets of a small amount of fraudulent accounts. These fake accounts are set up to artificially inflate certain posts causing them to shoot up into Sina Weibo's trending list, which are in turn displayed as the most popular topics to users., Comment: arXiv admin note: text overlap with arXiv:1107.3522
- Published
- 2012
41. The Pulse of News in Social Media: Forecasting Popularity
- Author
-
Bandari, Roja, Asur, Sitaram, and Huberman, Bernardo A.
- Subjects
Computer Science - Computers and Society ,Computer Science - Networking and Internet Architecture ,Computer Science - Social and Information Networks ,Physics - Physics and Society - Abstract
News articles are extremely time sensitive by nature. There is also intense competition among news items to propagate as widely as possible. Hence, the task of predicting the popularity of news items on the social web is both interesting and challenging. Prior research has dealt with predicting eventual online popularity based on early popularity. It is most desirable, however, to predict the popularity of items prior to their release, fostering the possibility of appropriate decision making to modify an article and the manner of its publication. In this paper, we construct a multi-dimensional feature space derived from properties of an article and evaluate the efficacy of these features to serve as predictors of online popularity. We examine both regression and classification algorithms and demonstrate that despite randomness in human behavior, it is possible to predict ranges of popularity on twitter with an overall 84% accuracy. Our study also serves to illustrate the differences between traditionally prominent sources and those immensely popular on the social web.
- Published
- 2012
42. Swayed by Friends or by the Crowd?
- Author
-
Abbassi, Zeinab, Aperjis, Christina, and Huberman, Bernardo A.
- Subjects
Computer Science - Social and Information Networks ,Computer Science - Computers and Society ,Physics - Physics and Society - Abstract
We have conducted three empirical studies of the effects of friend recommendations and general ratings on how online users make choices. These two components of social influence were investigated through user studies on Mechanical Turk. We find that for a user deciding between two choices an additional rating star has a much larger effect than an additional friend's recommendation on the probability of selecting an item. Equally important, negative opinions from friends are more influential than positive opinions, and people exhibit more random behavior in their choices when the decision involves less cost and risk. Our results can be generalized across different demographics, implying that individuals trade off recommendations from friends and ratings in a similar fashion.
- Published
- 2011
43. Long Trend Dynamics in Social Media
- Author
-
Wang, Chunyan and Huberman, Bernardo A.
- Subjects
Physics - Physics and Society ,Computer Science - Computers and Society ,Computer Science - Social and Information Networks - Abstract
A main characteristic of social media is that its diverse content, copiously generated by both standard outlets and general users, constantly competes for the scarce attention of large audiences. Out of this flood of information some topics manage to get enough attention to become the most popular ones and thus to be prominently displayed as trends. Equally important, some of these trends persist long enough so as to shape part of the social agenda. How this happens is the focus of this paper. By introducing a stochastic dynamical model that takes into account the user's repeated involvement with given topics, we can predict the distribution of trend durations as well as the thresholds in popularity that lead to their emergence within social media. Detailed measurements of datasets from Twitter confirm the validity of the model and its predictions.
- Published
- 2011
44. To Switch or Not To Switch: Understanding Social Influence in Recommender Systems
- Author
-
Zhu, Haiyi, Huberman, Bernardo A., and Luon, Yarun
- Subjects
Computer Science - Computers and Society ,Computer Science - Human-Computer Interaction ,Computer Science - Social and Information Networks ,Physics - Physics and Society - Abstract
We designed and ran an experiment to test how often people's choices are reversed by others' recommendations when facing different levels of confirmation and conformity pressures. In our experiment participants were first asked to provide their preferences between pairs of items. They were then asked to make second choices about the same pairs with knowledge of others' preferences. Our results show that others people's opinions significantly sway people's own choices. The influence is stronger when people are required to make their second decision sometime later (22.4%) than immediately (14.1%). Moreover, people are most likely to reverse their choices when facing a moderate number of opposing opinions. Finally, the time people spend making the first decision significantly predicts whether they will reverse their decisions later on, while demographics such as age and gender do not. These results have implications for consumer behavior research as well as online marketing strategies.
- Published
- 2011
45. Collective Attention and the Dynamics of Group Deals
- Author
-
Ye, Mao, Wang, Chunyan, Aperjis, Christina, Huberman, Bernardo A., and Sandholm, Thomas
- Subjects
Computer Science - Computers and Society ,Physics - Physics and Society - Abstract
We present a study of the group purchasing behavior of daily deals in Groupon and LivingSocial and introduce a predictive dynamic model of collective attention for group buying behavior. In our model, the aggregate number of purchases at a given time comprises two types of processes: random discovery and social propagation. We find that these processes are very clearly separated by an inflection point. Using large data sets from both Groupon and LivingSocial we show how the model is able to predict the success of group deals as a function of time. We find that Groupon deals are easier to predict accurately earlier in the deal lifecycle than LivingSocial deals due to the final number of deal purchases saturating quicker. One possible explanation for this is that the incentive to socially propagate a deal is based on an individual threshold in LivingSocial, whereas in Groupon it is based on a collective threshold, which is reached very early. Furthermore, the personal benefit of propagating a deal is also greater in LivingSocial.
- Published
- 2011
46. What Trends in Chinese Social Media
- Author
-
Yu, Louis, Asur, Sitaram, and Huberman, Bernardo A.
- Subjects
Computer Science - Computers and Society ,Computer Science - Social and Information Networks ,Physics - Physics and Society - Abstract
There has been a tremendous rise in the growth of online social networks all over the world in recent times. While some networks like Twitter and Facebook have been well documented, the popular Chinese microblogging social network Sina Weibo has not been studied. In this work, we examine the key topics that trend on Sina Weibo and contrast them with our observations on Twitter. We find that there is a vast difference in the content shared in China, when compared to a global social network such as Twitter. In China, the trends are created almost entirely due to retweets of media content such as jokes, images and videos, whereas on Twitter, the trends tend to have more to do with current global events and news stories.
- Published
- 2011
47. Trends in Social Media : Persistence and Decay
- Author
-
Asur, Sitaram, Huberman, Bernardo A., Szabo, Gabor, and Wang, Chunyan
- Subjects
Computer Science - Computers and Society ,Physics - Physics and Society - Abstract
Social media generates a prodigious wealth of real-time content at an incessant rate. From all the content that people create and share, only a few topics manage to attract enough attention to rise to the top and become temporal trends which are displayed to users. The question of what factors cause the formation and persistence of trends is an important one that has not been answered yet. In this paper, we conduct an intensive study of trending topics on Twitter and provide a theoretical basis for the formation, persistence and decay of trends. We also demonstrate empirically how factors such as user activity and number of followers do not contribute strongly to trend creation and its propagation. In fact, we find that the resonance of the content with the users of the social network plays a major role in causing trends.
- Published
- 2011
48. Social Attention and the Provider's Dilemma
- Author
-
Aperjis, Christina and Huberman, Bernardo A.
- Subjects
Computer Science - Computers and Society ,Physics - Physics and Society - Abstract
While attracting attention is one of the prime goals of content providers, the conversion of that attention into revenue is by no means obvious. Given that most users expect to consume web content for free, a provider with an established audience faces a dilemma. Since the introduction of advertisements or subscription fees will be construed by users as an inconvenience which may lead them to stop using the site, what should the provider do in order to maximize revenues? We address this question through the lens of adaptation theory, which states that even though a change affects a person's utility initially, as time goes on people tend to adapt and become less aware of past changes. We establish that if the likelihood of continuing to attend to the provider after an increase in inconvenience is log-concave in the magnitude of the increase, then the provider faces a tradeoff between achieving a higher revenue per user sooner and maximizing the number of users in the long term. On the other hand, if the likelihood of continuing to attend to the provider after an increase in inconvenience is log-convex, then it is always optimal for the provider to perform the increase in one step.
- Published
- 2010
49. Human Speed-Accuracy Tradeoffs in Search
- Author
-
Aperjis, Christina, Huberman, Bernardo A., and Wu, Fang
- Subjects
Computer Science - Computers and Society ,Physics - Physics and Society - Abstract
When foraging for information, users face a tradeoff between the accuracy and value of the acquired information and the time spent collecting it, a problem which also surfaces when seeking answers to a question posed to a large community. We empirically study how people behave when facing these conflicting objectives using data from Yahoo Answers, a community driven question-and-answer site. We first study how users behave when trying to maximize the amount of acquired information while minimizing the waiting time. We find that users are willing to wait longer for an additional answer if they have received a small number of answers. We then assume that users make a sequence of decisions, deciding to wait for an additional answer as long as the quality of the current answer exceeds some threshold. The resulting probability distribution for the number of answers that a question gets is an inverse Gaussian, a fact that is validated by our data.
- Published
- 2010
50. Influence and Passivity in Social Media
- Author
-
Romero, Daniel M., Galuba, Wojciech, Asur, Sitaram, and Huberman, Bernardo A.
- Subjects
Computer Science - Computers and Society ,Physics - Physics and Society - Abstract
The ever-increasing amount of information flowing through Social Media forces the members of these networks to compete for attention and influence by relying on other people to spread their message. A large study of information propagation within Twitter reveals that the majority of users act as passive information consumers and do not forward the content to the network. Therefore, in order for individuals to become influential they must not only obtain attention and thus be popular, but also overcome user passivity. We propose an algorithm that determines the influence and passivity of users based on their information forwarding activity. An evaluation performed with a 2.5 million user dataset shows that our influence measure is a good predictor of URL clicks, outperforming several other measures that do not explicitly take user passivity into account. We also explicitly demonstrate that high popularity does not necessarily imply high influence and vice-versa.
- Published
- 2010
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.